Securing a Complete System Environment: SELinux

48. Introduction
49. The root of the problem: Discretionary access control
50. Ways to control authority.
51. SELinux core concepts
52. User roles and transitions
53. Roles and Granularity of Protection
54. SELinux Domains and Types
55. Security Descriptors and IDs (SIDs)
56. SELinx Objects and access methods
57. SELinux Implementation of a policy
58. General Definitions
59. Type Enforcement and File Context Definitions
60. Macros and Processing, Compilation
61. Adding a new program
62. Conclusion